• Title/Summary/Keyword: Cyber Research

Search Result 1,465, Processing Time 0.029 seconds

METAPHORIC NAVIGATION AIDS FOR CYBER SHOPPING MALLS: AN EMPIRICAL STUDY TOWARD THE CONSTRUCTION OF CUSTOMER INTERFACE

  • Kim, Jin-Woo
    • Management Science and Financial Engineering
    • /
    • v.3 no.2
    • /
    • pp.1-27
    • /
    • 1997
  • Designing effective navigation aids for customer interfaces is critical for the success of cyber shopping malls. Navigation aids can be classified into either basic ones which are based on the structure of the malls or add-ons which are not. Add-on navigation aids provide various short-cuts to promote efficient traversal in the cyber shopping malls, but too many of them would increase the complexity of the customer interface. Metaphors have been used widely for the design of add-on navigation aids, but little research evaluates their impact on the processes and outcomes of customers behavior in cyber shopping malls. This paper presents an empirical study that investigates the navigation process of customers and the subjective evaluation of their shopping experience. This research implemented two versions of a test-bed cyber shopping mall according to different metaphors used; one based on a spatial metaphor, and the other based on a non spatial metaphor. The results of the experiment indicate that navigation aids based on the spatial metaphor were used more frequently, which resulted in better understanding about the entire structure of the cyber shopping malls, which in turn led to an increased ease of finding target items and also a more pleasant shopping experience. The benefits of navigation aids based on the spatial metaphor became more evident when customers were looking for ad-hoc category items rather than common items. This paper presents plausible explanations for the results and implications to the design of navigation aids for cyber shopping malls.

  • PDF

Development of the framework for quantitative cyber risk assessment in nuclear facilities

  • Kwang-Seop Son;Jae-Gu Song;Jung-Woon Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.6
    • /
    • pp.2034-2046
    • /
    • 2023
  • Industrial control systems in nuclear facilities are facing increasing cyber threats due to the widespread use of information and communication equipment. To implement cyber security programs effectively through the RG 5.71, it is necessary to quantitatively assess cyber risks. However, this can be challenging due to limited historical data on threats and customized Critical Digital Assets (CDAs) in nuclear facilities. Previous works have focused on identifying data flows, the assets where the data is stored and processed, which means that the methods are heavily biased towards information security concerns. Additionally, in nuclear facilities, cyber threats need to be analyzed from a safety perspective. In this study, we use the system theoretic process analysis to identify system-level threat scenarios that could violate safety constraints. Instead of quantifying the likelihood of exploiting vulnerabilities, we quantify Security Control Measures (SCMs) against the identified threat scenarios. We classify the system and CDAs into four consequence-based classes, as presented in NEI 13-10, to analyze the adversary impact on CDAs. This allows for the ranking of identified threat scenarios according to the quantified SCMs. The proposed framework enables stakeholders to more effectively and accurately rank cyber risks, as well as establish security and response strategies.

A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data (드론 RC 무선조종기 제어 데이터 보호를 위한 경량암호 적용 방법에 관한 연구)

  • Joungil Yun;Seungyong Yoon;Byoungkoo Kim;Yousung Kang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1185-1186
    • /
    • 2023
  • RC 무선조종기를 통해 드론을 원격으로 제어하는 경우, 제어 데이터의 기밀성과 무결성은 드론 제어권 탈취 방지를 위한 핵심 고려 사항이다. 본 논문은 드론 RC 무선조종기 제어 데이터 보호를 위해 경량 암호화 알고리즘 중 하나인 Lightweight Encryption Algorithm (LEA)를 적용하는 방법을 제시한다. LEA 는 32 비트 마이크로 컨트롤러인 ARM Cortex-M4 와 같은 플랫폼에 최적화된 구조로, 저전력으로 데이터 보호를 유지하면서 효율적인 암호화 알고리즘을 적용할 수 있다.

A Study on Improving the Visibility of Cyber Spaces for Cyber Businesses (사이버비즈니스를 위한 사이버공간의 가시성 증진에 관한 연구)

  • Choi, S.I.
    • Smart Media Journal
    • /
    • v.1 no.1
    • /
    • pp.80-83
    • /
    • 2012
  • This paper deals with the problems that entrepreneurs are facing while launching the cyber businesses. They are afraid of getting into cyber spaces due to the lack of visibilities. This paper adopts the relation concept in the mathematics to improve the visibility of cyber spaces. This research shows the competitiveness in cyber businesses comes from the clear understanding of visibility and reliability problems naturally embodied in the cyber space.

  • PDF

A Study on the Method for Activation of Cyber Class by Classification of Contents (콘텐츠 분류에 따른 사이버 수업 활성화 방안에 관한 연구)

  • Kim, kyung-hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.920-923
    • /
    • 2007
  • Cyber Educations of University are increasing in development of Contents and spreading Internet Network. We need to classify a cyber education by the type, and analyze environment. In addition, We need a measurement of effectiveness and the research of method for activation of cyber education. In this paper, we classify into partial cyber which is mixed face-to face lecture and cyber lecture and full cyber which is organized all cyber lecture, and investigate a satisfaction of learner. We analysis also the problem in cyber classes according to their types, and propose a plan for activation.

  • PDF

Sense of Social Presence Versus Learning Environment : Centering on Effects of Learning Satisfaction and Achievement in Cyber Education 2.0

  • Yum, Jihwan
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4
    • /
    • pp.141-156
    • /
    • 2014
  • This study intended to evaluate the viability of cyber education in terms of learning satisfaction and learning achievement. The study integrated two research streams such as social presence model and learning environment model. Where the learning environment model emphasizes the components of learning aids, social presence model considers more deeply the relationships among peers and with instructors. These two research streams have been considered relatively independently. The study integrated these ideas and measured their reliabilities and validities. The results demonstrate that the two constructs are relevantly independent and both of these constructs are very important considerations for the success of cyber education. The study concludes that cyber education 2.0 requires more social presence factors than the learning environment factors such as technological development or new equipments.

Study on Cyber Fashion for the Proposal of the Future Fashion (미래 패션 제안을 위한 사이버 패션 연구)

  • Lee, Su-Aa;Park, Hyun
    • Fashion & Textile Research Journal
    • /
    • v.1 no.3
    • /
    • pp.239-245
    • /
    • 1999
  • The purpose of this study is to suggest the direction of the future fashion by grasping the cyber fashion, which is discussed outstandingly in the recent fashion world, into internal expression and external features. The result of this study is as follows: Cyber fashion means the application of the electronic image, dynamic phenonmenon of machine, and the effects of light to fashion, and it has some external features of geometrical pattern, dynamic structure, and high-tech material and color: Aside from this noticeable characteristics, cyber fashion has some internal features of the direction toward future, the anti-culture, and the surreal. In this cyber fashion, first, computer will be introduced and used as the means to realize a dream of human being. Second, it will be designed with the ideal feature of future society. Third, it will be possible to develope material and design to solve ecological issue of human beings. Fourth, the fashion to give the peace and stability to human being will be popular.

  • PDF

Development of Hardware In the Loop System for Cyber Security Training in Nuclear Power Plants (원자력발전소 사이버보안 훈련을 위한 HIL(Hardware In the Loop) System 개발)

  • Song, Jae-gu;Lee, Jung-woon;Lee, Cheol-kwon;Lee, Chan-young;Shin, Jin-soo;Hwang, In-koo;Choi, Jong-gyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.867-875
    • /
    • 2019
  • Security awareness and training are becoming more important as cyber security incidents tend to increase in industrial control systems, including nuclear power plants. For effective cyber security awareness and training for the personnel who manage and operate the target facility, a TEST-BED is required that can analyze the impact of cyber attacks from the sensor level to the operation status of the nuclear power plant. In this paper, we have developed an HIL system for nuclear power plant cyber security training. It includes nuclear power plant status simulations and specific system status simulation together with physical devices. This research result will be used for the specialized cyber security training program for Korean nuclear facilities.

The Research on the Cyber Dating Violence of Korean High School Students (청소년의 사이버 데이팅 폭력 및 관련요인에 관한 연구)

  • Park Ok Im;Bae Yeong Suk;Kim Jeong Sook;Kim Jong Seong
    • The Korean Journal of Community Living Science
    • /
    • v.16 no.3
    • /
    • pp.65-73
    • /
    • 2005
  • The purpose of the research was to investigate the characteristics and related factors of cyber dating violence. The subjects were 548 adolescents in high schools. The gathered information was analyzed by frequency, percent, 1-test, ANOVA, and Correlation by using SPSS 10.0 program. The results were as follows: (1) $65.3{\%}$ of the answerers experienced cyber dating, and $44.5{\%}$ of the students have experienced cyber dating violence. (2) $40.3{\%}$ of the students were damaged by psychological violence, and $21.1{\%}$ of the students have caused psychological violence. (3) $41.9{\%}$ of the damaged students and $18{\%}$ of the perpetrating students were included in the total answerers, but among 244 experienced students, $94.3{\%}$ were damaged students and $40.6{\%}$ perpetrated sexual violence, so it is concluded that experienced students experience sexual violence. (4) Looking over the social demography factors and cyber dating violence, boys rather than girls, and vocational school students rather than academic school students have more cyber violence experiences. (5) The relationship between psychological and sexual violence has a significant relationship with all cyber violence experiences.

  • PDF

Clustering Keywords to Define Cybersecurity: An Analysis of Malaysian and ASEAN Countries' Cyber Laws

  • Joharry, Siti Aeisha;Turiman, Syamimi;Nor, Nor Fariza Mohd
    • Asia Pacific Journal of Corpus Research
    • /
    • v.3 no.2
    • /
    • pp.17-33
    • /
    • 2022
  • While the term is nothing new, 'cybersecurity' still seems to be defined quite loosely and subjectively depending on context. This is problematic especially to legal writers for prosecuting cybercrimes that do not fit a particular clause/act. In fact, what is more difficult is the non-existent single 'cybersecurity law' in Malaysia, rather than the current implementation of 10-related cyber security acts. In this paper, the 10 acts are compiled into a corpus to analyse the language used in these acts via a corpus linguistics approach. A list of frequent words is firstly investigated to see whether the so-called related laws do talk about cybersecurity followed by close inspection of the concordance lines and habitually associated phrases (clusters) to explore use of these words in context. The 'compare 2 wordlist' feature is used to identify similarities or differences between the 10 Malaysian cybersecurity related laws against a corpus of cyber laws from other ASEAN countries. Findings revealed that ASEAN cyber laws refer mostly to three cybersecurity dominant themes identified in the literature: technological solutions, events, and strategies, processes, and methods, whereas Malaysian cybersecurity-related laws revolved around themes like human engagement, and referent objects (of security). Although these so-called cyber related policies and laws in Malaysia are highlighted in the National Cyber Security Agency (NACSA), their practical applications to combat cybercrimes remain uncertain.